Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5633 PoC — D-Link DI-524无线路由器跨站请求伪造漏洞

Source
Associated Vulnerability
Title:D-Link DI-524无线路由器跨站请求伪造漏洞 (CVE-2017-5633)
Description:D-Link DI-524 Wireless Router是友讯(D-Link)公司的一款无线路由器。 使用9.01版本固件的D-Link DI-524无线路由器中存在跨站请求伪造漏洞。远程攻击者可通过向CGI程序发送特制的请求利用该漏洞更改管理员密码或重启设备。
Description
Exploit developed by me for CVE-2017-5633.
Readme
# Exploit-CVE-2017-5633
I like to code, not to do readme.md.
File Snapshot

[4.0K] /data/pocs/bfe4ec3e664164aee93648e941a213856b998b83 ├── [4.3K] exploitrouter524.py └── [ 61] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.